Loading…

Handbook of information security . Volume 1, Key concepts, infrastructure, standards, and protocols /

The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on information and computer security. The text contains 180 articles from over 200 leading experts, providing the benchmark resource for informat...

Full description

Bibliographic Details
Call Number:Libro Electrónico
Other Authors: Bidgoli, Hossein
Format: Electronic eBook
Language:Inglés
Published: Hoboken, N.J. : John Wiley, ©2006.
Subjects:
Online Access:Texto completo (Requiere registro previo con correo institucional)
Table of Contents:
  • Cover
  • Contents
  • Preface
  • Guide to The Handbook of Information Security
  • PART 1: Key Concepts and Applications Related to Information Security
  • Internet Basics
  • INTRODUCTION
  • INFORMATION SUPERHIGHWAY AND THE WORLD WIDE WEB
  • DOMAIN NAME SYSTEMS
  • NAVIGATIONAL TOOLS, SEARCH ENGINES, AND DIRECTORIES
  • INTERNET SERVICES THAT SUPPORT ELECTRONIC COMMERCE
  • WHAT IS AN INTRANET?
  • INTERNET VERSUS INTRANETS
  • SELECTED APPLICATIONS OF AN INTRANET
  • WHAT IS AN EXTRANET?
  • SELECTED INTERNET APPLICATIONS
  • GLOSSARY
  • CROSS REFERENCES
  • REFERENCES
  • FURTHER READING
  • Digital Economy
  • INTRODUCTION
  • INFORMATION TECHNOLOGY, THE DIGITAL ECONOMY, AND E-COMMERCE
  • SIZE AND GROWTH OF THE DIGITAL ECONOMY
  • IMPLICATIONS FOR MARKETS AND ORGANIZATIONS
  • SECURITY
  • GOVERNMENT POLICIES
  • WORK, PLAY, AND COMMUNITIES
  • CONCLUSION
  • GLOSSARY
  • CROSS REFERENCES
  • REFERENCES
  • FURTHER READING
  • Online Retail Banking: Security Concerns, Breaches, and Controls
  • INTRODUCTION
  • TYPES OF ONLINE RETAIL BANKING SERVICES
  • ONLINE BANKING SECURITY CONCERNS
  • DEFINITION OF SECURITY
  • SOURCES AND CONTROLS OF EXTERNAL INFORMATION SECURITY BREACHES
  • SOURCES AND CONTROLS OF INTERNAL INFORMATION SECURITY BREACHES
  • CONCLUSION
  • GLOSSARY
  • CROSS REFERENCES
  • REFERENCES
  • FURTHER READING
  • Digital Libraries: Security and Preservation Considerations
  • INTRODUCTION
  • CONSTRUCTING DIGITAL LIBRARIES
  • SECURITY AND DIGITAL LIBRARIES
  • PRESERVATION AND DIGITAL LIBRARIES
  • CONTINUITY OF DIGITAL LIBRARIES
  • CONCLUSION
  • GLOSSARY
  • CROSS REFERENCES
  • REFERENCES
  • E-Mail and Instant Messaging
  • INTRODUCTION
  • ELECTRONIC MAIL
  • INSTANT MESSAGING
  • SECURITY IN E-MAIL AND IM ENVIRONMENTS
  • CONCLUSION
  • GLOSSARY
  • CROSS REFERENCES
  • REFERENCES
  • FURTHER READING
  • Internet Relay Chat
  • SECURE COMMUNICATION USING INTERNET RELAY CHAT
  • STRUCTURE AND OPERATION
  • SOCIAL FACTORS
  • SECURITY AND LEGAL ISSUES
  • FUTURE OF IRC
  • GLOSSARY
  • CROSS REFERENCES
  • REFERENCES
  • FURTHER READING
  • Online Communities
  • INTRODUCTION
  • DEFINITION AND ATTRIBUTES
  • HISTORY OF ONLINE COMMUNITIES
  • TYPES OF ONLINE COMMUNITIES
  • ONLINE COMMUNITY CONSEQUENCES
  • RESEARCH METHODS AND ISSUES
  • CONCLUSION
  • GLOSSARY
  • CROSS REFERENCES
  • REFERENCES
  • Groupware: Risks, Threats, and Vulnerabilities in the Internet Age
  • INTRODUCTION
  • WHY GROUPWARE?
  • GROUPWARE AND SECURITY
  • DEFINING AND CLASSIFYING GROUPWARE IN THE INTERNET AGE
  • GROUPWARE FUNCTIONALITIES IN THE INTERNET AGE
  • GROUPWARE MANAGEMENT ISSUES: PRODUCTIVITY AND ORGANIZATIONAL EFFECTS
  • CONCLUSION
  • GLOSSARY
  • CROSS REFERENCES
  • REFERENCES
  • FURTHER READING
  • Search Engines: Security, Privacy, and Ethical Issues
  • INTRODUCTION
  • SEARCHER
  • SEARCH ENGINE
  • WEB SITE
  • SEARCH ETHICS
  • CONCLUSION
  • GLOSS.